Commercial Windows-based compromised Web shells management application spotted in the wild – part two by Blog Staff | Mar 13, 2014 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Managed Web-based 300 GB/s capable DNS amplification enabled malware bot spotted in the wild by Blog Staff | Mar 7, 2014 | Industry Intel, Threat Lab Reading Time: ~ 3 min.
Deceptive ads expose users to PUA.InstallBrain/PC Performer PUA (Potentially Unwanted Application) by Blog Staff | Mar 6, 2014 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Spamvertised ‘You received a new message from Skype voicemail service’ themed emails lead to Angler exploit kit by Blog Staff | Feb 20, 2014 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Spamvertised ‘Image has been sent’ Evernote themed campaign serves client-side exploits by Blog Staff | Feb 18, 2014 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
DoubleClick malvertising campaign exposes long-run beneath the radar malvertising infrastructure by Blog Staff | Feb 14, 2014 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
‘Hacking for hire’ teams occupy multiple underground market segments, monetize their malicious ‘know how’ by Blog Staff | Feb 13, 2014 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Malicious campaign relies on rogue WordPress sites, leads to client-side exploits through the Magnitude exploit kit by Blog Staff | Feb 12, 2014 | Industry Intel, Threat Lab Reading Time: ~ < 1 min.
Managed TeamViewer based anti-forensics capable virtual machines offered as a service by Blog Staff | Feb 10, 2014 | Industry Intel, Threat Lab Reading Time: ~ 4 min.
Market leading ‘standardized cybercrime-friendly E-shop’ service brings 2500+ boutique E-shops online by Blog Staff | Feb 7, 2014 | Industry Intel, Threat Lab Reading Time: ~ 3 min.
Cybercriminals release Socks4/Socks5 based Alexa PageRank boosting application by Blog Staff | Feb 4, 2014 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Cybercriminals release new Web based keylogging system, rely on penetration pricing to gain market share by Blog Staff | Jan 31, 2014 | Industry Intel, Threat Lab Reading Time: ~ 2 min.